1.2.11 Discuss the social and ethical issues associated with the introduction of new IT systems.
relating to human society, the interaction of the individual and the group, or the welfare of human beings as members of society
Changing structure of employment.
New technological advancements leads to job redundancy, specifically in low-paying repetitive processing jobs.
Due to automation, many companies do not have the skills to compete in the modern workforce.
Governments must create incentives for growth in fields of expanded employment as well as implement training programs for those who have become structurally unemployed.
Limited legal protection.
Legal frameworks lag behind technical developments.
In the absence of thorough legislation, ethics must fill the gap.
Legal systems in different countries are not aligned to offer the same protections on issues such as personal privacy or corporate espionage.
involving or expressing moral approval or disapproval (ethical judgments)
conforming to accepted standards of conduct (ethical behavior)
Technologies on gathering, storing, manipulating and communicating data are revolutionizing the use and spread of information.
These force people to address entirely new rights and responsibilities in their use of information.
Organizations must re-evaluate standards of conduct to adapt to the introduction of new technology systems.
Misuse of information / data privacy.
Electronic systems and data collection reach into all levels of government, businesses and personal lives.
Companies with access to this data have an advantage when competing in the market place.
An individual’s personal data may be sold from company to company without their knowledge.
Users rarely examine the details of user agreement for a new web service, but usually they give the company complete control over the data.
Censorship is the suppression of speech, public communication, or other information, on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient."
Governments can attempt to control the content that users in their country can access.
This is done by controlling the Internet Service Providers (ISPs) and access into the nation’s networks.
Governments can acquire increasingly obtrusive data on its citizens.
They can use this to silence opposition forces and target individuals or groups.